Open VSXÁîÅÆÐ¹Â¶Òý·¢¹©Ó¦Á´¹¥»÷

Ðû²¼Ê±¼ä 2025-11-04

1. Open VSXÁîÅÆÐ¹Â¶Òý·¢¹©Ó¦Á´¹¥»÷


11ÔÂ2ÈÕ £¬¿ËÈÕ £¬Open VSX×¢²á±íÒò¿ª·¢ÕßÒâÍâй¶»á¼ûÁîÅÆ £¬µ¼ÖÂÍþвÐÐΪÕßÌᳫ¹©Ó¦Á´¹¥»÷ £¬ÔÚ¹«¹²´æ´¢¿âÖÐÐû²¼¶ñÒâÀ©Õ¹³ÌÐò ¡£Á½ÖÜǰ £¬WizÑо¿Ö°Ô±·¢Ã÷Microsoft VSCodeºÍOpen VSXÊг¡Öг¬550¸öÉñÃØÐÅÏ¢Ôâй¶ £¬²¿·ÖÉñÃØ¿É»á¼ûÏÂÔØÁ¿´ï15Íò´ÎµÄÏîÄ¿ £¬Ê¹¹¥»÷ÕßÄÜÉÏ´«¶ñÒâÀ©Õ¹ £¬×é³ÉÑÏÖØ¹©Ó¦Á´Î£º¦ ¡£Open VSXÓÉEclipse»ù½ð»á¿ª·¢ £¬ÊÇ΢ÈíVisual Studio MarketplaceµÄ¿ªÔ´Ìæ»»¼Æ»® £¬ÎªVS Code IDE¼°¼æÈÝ·ÖÖ§ÌṩÀ©Õ¹Ö§³Ö ¡£´Ë´ÎÊÂÎñÖÐ £¬Ð¹Â¶µÄÁîÅÆ±»ÓÃÓÚÃûΪ"GlassWorm"µÄ¶ñÒâÈí¼þ¹¥»÷ £¬¸ÃÈí¼þʹÓò»¿É¼ûUnicode×Ö·ûÒþ²Ø×ÔÈö²¥¶ñÒâ´úÂë £¬ÊÔͼÇÔÈ¡¿ª·¢Õ߯¾Ö¤²¢ÔÚ¿É»á¼ûÏîÄ¿ÖÐÒý·¢¼¶ÁªÎó²î £¬Ä¿µÄÖ±Ö¸49¸öÀ©Õ¹³ÌÐòµÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý £¬ÄîÍ·ÒÉËÆ¾­¼ÃÀûÒæ ¡£×èÖ¹10ÔÂ21ÈÕ £¬ËùÓжñÒâÀ©Õ¹Òѱ»É¾³ý £¬Ïà¹ØÁîÅÆÍê³ÉÂÖ»»»ò×÷·Ï £¬ÊÂÎñÒÑÍêÈ«¿ØÖÆ ¡£È»¶ø £¬Íþв²¢Î´ÖÕÖ¹ ¡£Ñо¿Ö°Ô±·¢Ã÷ £¬GlassWorm±³ºóµÄͳһÍþвÐÐΪÕßÒÑ×ªÒÆÖÁGitHub £¬Ê¹ÓÃÏàͬUnicodeÒþдÊõ¼¼ÇÉÒþ²Ø¶ñÒâÔØºÉ £¬¹¥»÷¹æÄ£À©Õ¹ÖÁ¶à¸öJavaScriptÏîÄ¿´úÂë¿â ¡£


https://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/


2. ÐÂÐÍHttpTroyºóÃųÌÐòÕë¶Ôº«¹ú·¢¶¯¶¨ÏòÍøÂç¹¥»÷


11ÔÂ3ÈÕ £¬½üÆÚ £¬Ó볯ÏʹØÁªµÄÍþвÐÐΪÕßKimsuky¼°Lazarus GroupÒ»Á¬¸üÐÂÆä¹¥»÷ÎäÆ÷¿â £¬Õ¹ÏÖÊÖÒÕÑݽøÇ÷ÊÆ ¡£¾ÝGen Digital¹«Ë¾Åû¶ £¬KimsukyÕë¶Ôº«¹ú¼òµ¥Ä¿µÄÌᳫ´¹ÂÚ¹¥»÷ £¬Í¨¹ýαװ³ÉVPNÕ˵¥µÄZIPѹËõÎļþ·Ö·¢ÐÂÐͺóÃųÌÐò¡°HttpTroy¡± ¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈý½×¶Î¹¥»÷Á´ÊµÑ飺³õʼΪGoÓïÑÔ¶þ½øÖÆÎļþ£¨ÄÚǶαװPDFÎĵµÒÔ½µµÍÊܺ¦ÕßСÐÄ£© £¬ËæºóÆô¶¯MemLoad¼ÓÔØ³ÌÐò½¨É賤ÆÚ»¯»úÖÆ £¬×îÖÕ°²ÅÅHttpTroyºóÃÅ ¡£¸ÃºóÃÅÖ§³ÖÎļþ´«Êä¡¢½ØÆÁ¡¢¸ßȨÏÞÏÂÁîÖ´ÐС¢·´ÏòShell½¨ÉèµÈ¹¦Ð§ £¬Í¨¹ýHTTP POSTÓëC2·þÎñÆ÷ͨѶ £¬²¢½ÓÄɶà²ã»ìÏýÊÖÒÕ¹æ±Ü¼ì²â ¡£Í¬Ê± £¬Lazarus GroupÕë¶Ô¼ÓÄôóÁ½ÃûÊܺ¦ÕßÌᳫ¹¥»÷ £¬°²ÅÅ¡°Comebacker¡±¶ñÒâ³ÌÐò¼°ÆäÉý¼¶°æ¡°BLINDINGCAN¡±Ô¶³Ì»á¼ûľÂí ¡£¹¥»÷Á´Öжα»¼ì²âµ½ £¬³õʼ»á¼û;¾¶ÍƲâΪ´¹ÂÚÓʼþ ¡£Comebacker±£´æDLLÓëEXEÁ½ÖÖ±äÌå £¬Ç°Õßͨ¹ýWindows·þÎñÆô¶¯ £¬ºóÕß¾­cmd.exeÖ´ÐÐ £¬×îÖÕ½âÃܲ¢°²ÅÅBLINDINGCAN £¬ºóÕßÓëC2·þÎñÆ÷ͨѶ £¬Ö§³ÖÎļþ²Ù×÷¡¢Àú³ÌÖÎÀí¡¢½ØÆÁ¡¢ºÛ¼£É¨³ýµÈ²Ù×÷ ¡£


https://thehackernews.com/2025/11/new-httptroy-backdoor-poses-as-vpn.html


3. ºÚ¿Í´ÓBalancer DeFi¼ÓÃÜЭÒéÇÔÈ¡Áè¼Ý1.2ÒÚÃÀÔª


11ÔÂ3ÈÕ £¬»ùÓÚÒÔÌ«·»µÄDeFiЭÒéBalancerµÄV2¿É¶Ñ·ÊÎȹ̳ØÔâÓöÖØ´óºÚ¿Í¹¥»÷ £¬Ëðʧ³¬1.28ÒÚÃÀÔª £¬³ÉΪ½ñÄê¶È×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸Ö®Ò» ¡£Balancer×÷Ϊ×Ô¶¯×öÊÐÉ̺ÍÁ÷¶¯ÐÔ»ù´¡ÉèÊ© £¬Ö§³Ö×Ô½ç˵´ú±Ò×éºÏ £¬ÆäV2³Ø´ËǰÒѽÓÊÜ11´ÎÇå¾²Éó¼Æ £¬µ«ÈÔÒòDZÔÚÎó²î±»Ê¹Óà ¡£ÊÂÎñ±¬·¢ºó £¬BalancerÍŶÓѸËÙÓë¶¥¼âÇå¾²Ñо¿»ú¹¹ÏàÖúÊÓ²ì £¬²¢ÖÒÑÔÓû§Ð¡ÐÄ´¹ÂÚΣº¦ ¡£Îó²î³ÉÒò±£´æÁ½ÖÖÖ÷Á÷ÍÆ²â£ºÆäÒ» £¬GoPlus SecurityÖ¸³öV2½ð¿âµÄ½»Á÷ÅÌËã±£´æ¾«¶ÈÉáÈëÎó²î £¬Ã¿´Î¶Ò»»²Ù×÷ÏòÏÂÈ¡Õû´ú±ÒÊýÄ¿ £¬¹¥»÷Õßͨ¹ýbatchSwapº¯ÊýÖØ¸´¶Ò»» £¬ÀÛ»ýϸС²î±ðµ¼Ö¼ÛǮŤÇú£»Æä¶þ £¬Çå¾²Ñо¿Ô±Aditya BajajÒÔΪ £¬¶ñÒâºÏÔ¼ÔÚ×Ê½ð³Ø³õʼ»¯½×¶ÎʹÓýð¿âŲÓà £¬ÈƹýÇå¾²²½·¥ £¬ÊµÏÖ¿ç³ØÎ´¾­ÊÚȨµÄÓà¶îʹÓà ¡£Ö»¹ÜÊÖÒÕϸ½ÚÉÐδÍêÈ«Ã÷È· £¬BalancerÔÊÐí½«Ðû²¼ÍêÕûʺóÆÊÎö ¡£ÖµµÃ×¢ÖØµÄÊÇ £¬ÊÂÎñ±¬·¢ºó £¬Õ©Æ­Õßð³äBalancerÏòºÚ¿ÍÌᳫ¡°°×ñÉͽð¡±Ì¸ÅÐ £¬Éù³ÆÈôËÍ»¹×ʽð¿É»ñ20%Éâå¶ £¬²»È»½«ÍŽáÇø¿éÁ´È¡Ö¤»ú¹¹¡¢Ö´·¨²¿·Ö¼°î¿ÏµÏàÖúͬ°é £¬Í¨¹ýIPµØµã¡¢ASNÅþÁ¬ÈÕÖ¾ºÍÁ´ÉÏÉúÒâʱ¼ä´Áʶ±ð¹¥»÷ÕßÉí·Ý ¡£


https://www.bleepingcomputer.com/news/cryptocurrency/hacker-steals-over-120-million-from-balancer-defi-crypto-protocol/


4. SesameOp¶ñÒâÈí¼þÀÄÓÃOpenAI Assistants APIÌᳫ¹¥»÷


11ÔÂ3ÈÕ £¬Î¢ÈíÇå¾²ÍŶÓÔÚ2025Äê7ÔÂÊÓ²ìÍøÂç¹¥»÷ʱ £¬·¢Ã÷ÃûΪSesameOpµÄÐÂÐͺóÃŶñÒâÈí¼þ £¬¸ÃÈí¼þͨ¹ýÀÄÓÃOpenAI Assistants API×÷ΪÒþ²ØµÄÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨µÀ £¬ÊµÏÖ¹¥»÷Õß¶ÔÊÜѬȾÇéÐεĺã¾ÃÒ»Á¬»á¼û ¡£Çø±ðÓڹŰåÒÀÀµ¶ñÒâ»ù´¡ÉèÊ©µÄ¹¥»÷·½·¨ £¬SesameOpʹÓÃÕýµ±ÔÆ·þÎñ¾ÙÐÐÔ¶³ÌÖÎÀí £¬ÓÐÓùæ±ÜÁËÊܺ¦Õß¾¯±¨¼°ÊÂÎñÏìӦʱ´úµÄ¼ì²âΣº¦ ¡£¾Ý΢ÈíDARTÍŶӱ¨¸æ £¬SesameOpºóÃÅ×é¼þ½«OpenAI Assistants API×÷Ϊ´æ´¢ºÍÖм̻úÖÆ £¬»ñȡѹËõ¼ÓÃܵÄÖ¸Áîºó½âÃÜÖ´ÐУ»Í¬Ê± £¬¹¥»÷ÖÐÍøÂçµÄÐÅϢͨ¹ý¶Ô³ÆÓë·Ç¶Ô³Æ¼ÓÃÜÍŽáµÄ·½·¨ £¬¾­Í³Ò»APIͨµÀ»Ø´«¹¥»÷Õß ¡£¸Ã¶ñÒâÈí¼þ¹¥»÷Á´°üÀ¨¸ß¶È»ìÏýµÄ¼ÓÔØÆ÷ºÍ»ùÓÚ.NETµÄºóÃųÌÐò £¬ºóÕßͨ¹ý.NET AppDomainManager×¢Èëµ½Microsoft Visual Studio¹¤¾ßÖÐ £¬ÍŽáÄÚ²¿Web Shell¼°¡°Õ½ÂÔÐÔ°²ÅÅ¡±µÄ¶ñÒâÀú³Ì½¨É賤ÆÚÐÔ £¬Ö§³Öºã¾ÃÌØ¹¤Ô˶¯ ¡£Î¢ÈíÇ¿µ÷ £¬´Ë´Î¹¥»÷²¢·ÇʹÓÃOpenAIƽ̨Îó²î»òÉèÖùýʧ £¬¶øÊÇÀÄÓÃAssistants APIµÄÄÚÖù¦Ð§ ¡£Î¢ÈíÓëOpenAIÒÑÏàÖúʶ±ð²¢½ûÓù¥»÷ÖÐʹÓõÄÕË»§¼°APIÃÜÔ¿ ¡£


https://www.bleepingcomputer.com/news/security/microsoft-sesameop-malware-abuses-openai-assistants-api-in-attacks/


5. È«Çò»õÔËÐÐÒµÔâRMM¹¤¾ß¹¥»÷Òý·¢¹©Ó¦Á´ÍµÇÔΣ»ú


11ÔÂ3ÈÕ £¬½üÆÚ £¬Õë¶Ô»õÔ˾­¼ÍÈ˺Ϳ¨³µÔËÊ乫˾µÄÍøÂç¹¥»÷·ºÆð¹æÄ£»¯Ç÷ÊÆ ¡£¾ÝProofpointÑо¿ £¬×Ô2025Äê1ÔÂÆð £¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÁ´½ÓºÍ´¹ÂÚÓʼþÒ»Á¬°²ÅÅÔ¶³Ì¼à¿ØÖÎÀí£¨RMM£©¹¤¾ß£¨ÈçScreenConnect¡¢SimpleHelpµÈ£© £¬ÔÚ±±ÃÀ¡¢°ÍÎ÷¡¢Ä«Î÷¸ç¡¢Ó¡¶È¡¢µÂ¹ú¡¢ÖÇÀû¼°ÄÏ·ÇµÈ¶àµØÊµÑé¹¥»÷ ¡£½ö8ÔÂÒÔÀ´ÒѼͼ½ü24ÆðÔ˶¯ £¬µ¥´Î¹¥»÷×î¶à·¢ËÍ1000ÌõÐÅÏ¢ ¡£¹¥»÷Õß½ÓÄÉË«ÖØÉøÍ¸Õ½ÂÔ£ºÒ»·½ÃæÊ¹Óñ»µÁ»õÔËÆ½Ì¨ÕË»§Ðû²¼ÐéØÍÆ·ÔËÐÅÏ¢ £¬ÁíÒ»·½ÃæÈëÇÖ»õÔ˾­¼ÍÈ˼°µ÷ÀíÔ±ÓÊÏä £¬Ð®ÖÆÓʼþÏß³ÌÓÕµ¼Êܺ¦Õß»á¼ûαÔìÒ³Ãæ ¡£ÕâÐ©Ò³ÃæÍ¨¹ý¾«×¼¸´ÖÆÔËÓªÉÌÆ·ÅƱêʶÔöÇ¿¿ÉÐÅ¶È £¬ÓÕÆ­Óû§ÏÂÔØ.exe»ò.msiÎļþ×°ÖÃRMM¹¤¾ß ¡£Ò»µ©Àֳɰ²ÅÅ £¬¹¥»÷Õß¼´¿ÉÍêÈ«¿ØÖÆÏµÍ³ £¬ÊµÏÖÐÞ¸ÄÔËÊäõè¾¶¡¢ÆÁÕϵ÷Àí֪ͨ¡¢Ã°³äÕýµ±³ÐÔËÈ˵ȲÙ×÷ £¬×îÖÕÐ®ÖÆ¸ß¼ÛÖµ»õÎÈçʳÎï¡¢µç×Ó²úÆ·£©²¢×ªÊÛ»ò×ß˽ ¡£


https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/


6. ÈÕ±¾AskulÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÊý¾Ýй¶ £¬¹©Ó¦Á´Êܲ¨¼°


11ÔÂ3ÈÕ £¬ÈÕ±¾°ì¹«¼°¼Ò¾ÓÓÃÆ·ÁãÊÛÉÌAskul¿ËÈÕ֤ʵ £¬10Ô³õÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó £¬¿Í»§Ó빩ӦÉÌÊý¾ÝÔâй¶ £¬Æäµç×ÓÉÌÎñƽ̨ÔËÓªÖÐÖ¹ ¡£´Ë´ÎÊÂÎñ²¨¼°ÆìÏÂÍøµê£¨Askul¡¢Lohaco¡¢Soloel Arena£© £¬Ð¹Â¶ÄÚÈݰüÀ¨Óû§ÁªÏµ·½·¨¡¢Ñ¯ÅÌÏêÇé¼°´æ´¢ÓÚÄÚ²¿·þÎñÆ÷µÄ¹©Ó¦ÉÌÊý¾Ý ¡£AskulÔÚÉùÃ÷ÖÐÖÂǸ £¬³ÆÕýÊÓ²ìRansomHouse×éÖ¯Éù³ÆµÄ1.1TBÊý¾ÝÇÔÈ¡ÊÂÎñ ¡£¹¥»÷Ó°ÏìÑÓÉìÖÁ¹©Ó¦Á´ÏàÖúͬ°é£ºÒÀÀµAskulÎïÁ÷ÍøÂçµÄÈÕ±¾´óÐÍÁãÊÛÉÌÁ¼Æ·ÍýÏ루ı»®ÎÞÓ¡Á¼Æ·Muji£©ºÍThe LoftËäδÃ÷È·×ÔÉíÊý¾ÝÊÇ·ñй¶ £¬µ«¹©Ó¦Á´ÒÑÊÜÈÅÂÒ ¡£RansomHouse×éÖ¯ÒÔ¡°²»¼ÓÃܽöÍþв¹ûÕæÊý¾Ý¡±µÄÀÕË÷ÊÖ¶ÎÖøÃû £¬×ÔÚ¼¡°ÕýÒåʵÁ¦¡±ÒÔ½ÒÆÆÆóÒµÎó²î ¡£¸Ã×éÖ¯½¨ÉèÓÚ2022Äê3Ô £¬ÍøÂçÇå¾²Ñо¿Òѽ«ÆäÓë¶íÂÞ˹¹ØÁªµÄÍþвÐÐΪÕߣ¨ÈçAlphv/BlackCat¡¢LockBit 3.0¡¢RagnarLocker£©¹Ò¹³ ¡£


https://therecord.media/askul-confirms-data-breach-ransomware-incident